Universal Access To All Knowledge
Home Donate | Store | Blog | FAQ | Jobs | Volunteer Positions | Contact | Bios | Forums | Projects | Terms, Privacy, & Copyright
Search: Advanced Search
Anonymous User (login or join us)
Upload
Search Results
Results: 1 through 50 of 371 (0.044 secs)
You searched for: subject:"Computer Security"
[1] 2 3 4 5 6 7 8     Next    Last
[texts]CS Chapter 5
computer security
Keywords: computer security
Downloads: 78
[movies]How Password Crackers Work
Find out how important secure passwords are and how easy ordinary passwords are to crack.
Keywords: computer security
Downloads: 155
[texts]computer security - englishlib.heliohost.org/
computer securityenglishlib.heliohost.org/
Keywords: computer security
Downloads: 24
[texts]200609 Security
Fastrack to Computer Security
Keywords: Computer Security
Downloads: 28
[texts]200907 FT Security - Digit
Fastrack to Computer Security
Keywords: Computer Security
Downloads: 48
[movies]Spyware: Think Before You Click
Find out how to protect yourself from spyware
Keywords: computer security
Downloads: 47
[audio]idogep elso adasa - Civil Radio Idogep c. musora
Az Idogep elso adasa. Vendeg: Palinkas Tibor szamitogepes szakerto Civil Radio
Keywords: computer,security,hungarian
Downloads: 134
[audio]Seguridad informatica - Dia de la seguridad en Internet - Onda Jaén
Seguridad informática - Día de la seguridad en Internet
Keywords: audio; computer security
Downloads: 35
[texts]Policies and guidelines for microcomputers - Massachusetts. Office of Management Information Systems
"April 1988."
Keywords: Microcomputers; Computer security
Downloads: 56
[texts]Security Controls for Computer Systems (U) - Rand Corporation
A seminal paper on the topic of Computer Security
Keywords: Computer Security; IT; hacking
Downloads: 159
[texts]Department of Defense Trusted Computer System Evaluation Criteria - DoD
A seminal paper on computer security.
Keywords: Computer Security; IT; hacking
Downloads: 294
[texts]Operating System Structures to Support Security and Reliable Software - Linden, Theodore
A seminal paper on Computer Security
Keywords: Computer Security; IT; hacking
Downloads: 92
[texts]Preliminary Notes on the Design of Secure Military Computer Systems - Schell, Roger et al.
A seminal paper on the subject of Computer Security
Keywords: Computer Security; IT; hacking
Downloads: 97
[texts]Secure MiniComputer Operating System - Ford Aerospace & Communications Corporation
A seminal paper on computer security.
Keywords: Computer Security; IT; hacking
Downloads: 94
[texts]Terminal Compromise: computer terrorism: when privacy and freedom are the victims: a novel - Schwartau, Winn
Book from Project Gutenberg: Terminal Compromise: computer terrorism: when privacy and freedom are the victims: a novel Library of Congress Classification: PQ
Keywords: Computer security -- Fiction
Downloads: 1,035
[texts]Hacking the Xbox, An introduction to Reverse Engineering - Andrew "bunnie" Huang
Through the example of the Xbox hacking this book gives an introduction to reverse engineering.
Keywords: Hacking; Xbox; Computer security
Downloads: 1,378
[texts]Computer Security Technology Planning Study - Anderson, James P.
A seminal Paper on the field of Computer Security
Keywords: Computer Security; IT; hacking
Downloads: 765
[texts]Multics Security Evaluation: Vulnerability Analysis - Karger, Paul; Schell, Roger
A seminal paper on computer security.
Keywords: Computer Security; IT; hacking
Downloads: 379
[texts]A Provably Secure Operating System - Neumann, P.G. et al.
A seminal paper on computer security.
Keywords: Computer Security; IT; hacking
Downloads: 246
[texts]Proposed Technical Evaluation Criteria for Trusted Computer Systems - Nibaldi, G.H.
A seminal paper on computer security.
Keywords: Computer Security; IT; hacking
Downloads: 107
[texts]Secure Computer System: Unified Exposition and Multics Interpretation - Bell
A seminal paper on computer security.
Keywords: Computer Security; IT; hacking
Downloads: 113
[texts]Practical Paranoid's Book of Computer Security - Homer Otto Goodall, Jr
This book was written by me. I am currently adding more to it and I will present it to the public as it is being written.
Keywords: Antivirus; Encryption; Computer security
Downloads: 253
[texts]Computer Security Threat: Monitoring and Surveillance - Anderson, James P.
A study for the purpose of improving computer security auditing.
Keywords: Computer Security; IT; hacking
Downloads: 338
[texts]The Design and Specification of a Security Kernel for the PDP 11/45 - Schiller, W.L.
A seminal paper on the subject of Computer Security
Keywords: Computer Security; IT; hacking
Downloads: 141
[texts]Subversion: The Neglected Aspect of Computer Security - Myers, Philip
A seminal paper on computer security.
Keywords: Computer Security; IT; hacking
Downloads: 139
[texts]Jobstream Separator System Design - Schacht, J.M.
A seminal paper on Computer Security
Keywords: Computer Security; IT; hacking
Downloads: 146
[texts]Protection Analysis: Final Report - Bisbey; Hollingworth
A seminal paper on computer security.
Keywords: Computer Security; IT; hacking
Downloads: 146
[texts]Design for Multics Security Enhancements - Whitmore, J et al.
A seminal paper in the field of Computer Security
Keywords: Computer Security; IT; hacking
Downloads: 214
[software]Computer Security - http://www.adolix.com/computer-security/
This program encrypts your files with more than 20 algorithms like Twofish, Cast128, Blowfish and Shaphire II. A special algorithm is used to securely erase data.
Keywords: Computer Security; System and utilities; Security; User management; Computer Security
Downloads: 48
[collection]OpenSecurityTraining.info
In the spirit of OpenCourseWare and the Khan Academy, OpenSecurityTraining.info is dedicated to sharing training material for computer security classes, on any topic, that are at least one day long. All material is licensed with an open license like CreativeCommons, allowing anyone to use the material however they see fit, so long as they share modified works back to the community. We highly encourage people who already know these topic areas to take the provided material and pursue paid and u...
Keywords: Open Security Training; computer security
Downloads: 305,105
[texts]Smashing the stack in Windows 8 - Davide Quarta
Since Windows Vista, many security features have been added to Windows [1], these got evenbetter with version 7 of the OS [2]. The upcoming Windows 8 brings better security in theuser interaction (less intrusive messages) and also under the hood.In this paper security features and aspects of Windows 8 will be shown, analyzing an overflowexploit in a test-bed environment to show how it works and updating precedent works[3] find-ings...
Keywords: stack; computer security; windows; ROP
Downloads: 454
[texts]Hacked to bits : hacking and cyberpolicy in the 21st century - Baxley, Caroline
Senior Honors Thesis in the Departments of Computer Science and History
Keywords: Sweet Briar College; Computer security
Downloads: 994
[texts]Windows Azure: Using Windows Azure's Service Bus to Solve Data Security Issues - Chambers, Don
Master's Thesis (M.S. in Applied Computer Science)--Columbus State University, 2010.
Keywords: Windows (Computer programs); Computer security
Downloads: 309
[audio]Creating a Self-Defending Network with Open Source Software - Ohio LinuxFest 2012
Defense-in-depth is a security concept in which you deploy multiple âlayersâ of defense on your network, each one protecting pieces that may have been missed by another. But these layers often operate independently of one another, going about their business without any interaction with one another. Using a few pieces of open source software â specifically OSSEC, Snort/Suricata, and Vyatta â a security administrator can build a set of layers that not only detects a scan or attack, but can pro...
Keywords: Computer Security; Network Security; Linux; FOSS
Downloads: 84
[image]Cfp Mock Vote 01
Aaron Swartz, participating in "mock voting" exercise at CFP 2004 (April 23, 2004) in Oakland, California. 
Keywords: aaronsw; CFP 2004; voting; computer security
Downloads: 44
[texts]Agencies in peril : are we doing enough to protect federal IT and secure sensitive information? : hearing before the Federal Financial Management, Government Information, Federal Services, and International Security Subcommittee of the Committee on Homeland Security and Governmental Affairs, United States Senate, One Hundred Tenth Congress, second session, March 12, 2008 - United States. Congress. Senate. Committee on Homeland Security and Governmental Affairs. Subcommittee on Federal Financial Management, Government Information, Federal Services, and International Security
In folder: Public laws / Senate / Hearings / 110th Congress / 2nd session / 2008
Keywords: Administrative agencies; Computer security; Data protection
Downloads: 1
[texts]Effective and efficient authentication and authorization in distributed systems - Kao, I-Lung
http://uf.catalog.fcla.edu/uf.jsp?st=UF002056075&ix=pm&I=0&V=D&pm=1
Keywords: Electronic data processing--Distributed processing--Computer security
Downloads: 102
[texts]Computer Security Handbook 6th Edition
Computer Security Handbook 6th Edition
Keywords: Computer Security Handbook 6th Edition
Downloads: 19
[texts]Public Employees' Retirement Division computer-based applications : report to the Legislature, EDP audit (Volume 1998) - Montana.Legislature.Legislative Audit Division
Cover title
Keywords: Legislative auditing; Computer security; Electronic data processing
Downloads: 214
[movies]Insecurity - Rohan Harris
Insecurity is a full-length independent feature-film released for free under a creative commons 3.0 license. When offered four thousand dollars to break into a computer network, Leon(Peter Love) and Greg (Kurtis Wakefield) aren't concerned with something as petty as morality. The only real questions are what complications can arise from hacking into a small home business, what's wrong with the twenty year old daughter Madison (Zoe Tarling).....
Keywords: insecurity, hacker, film, independent, computer security
Downloads: 6,081 5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars5.00 out of 5 stars(1 review)
[movies]VMS Home Movies - Patrick Jankowiak
These OpenVMS Home Movies illustrate how a hobbyist-managed computer system using the VMS operating system is not bothered by internet attacks, while a Windows server on the same network is quickly besieged and destroyed by both automated and human attackers. This is a non-commercial video created by a home user of OpenVMS on the Alpha hardware. Both machines were operated in the same datacenter and given their own individual fixed IP address and then placed directly on the internet with no spec...
Keywords: VMS; OpenVMS; computers; computer security; hackers; windows
Downloads: 135
[texts]Telecommunications security guidelines for telecommunications management network (Volume NIST special publication ; 800-13. Computer security) - Kimmins, John; Dinkel, Charles; Walters, Dale

Keywords: computer security; telecommunication--Security measures; TMN (Telecommunication system)
Downloads: 131
[texts]Evaluation of intrusion detection systems (Volume 108) - Ulvila, J.W.
Journal of Research of the National Institute of Standards and Technology
Keywords: intrusion detection; Bayesian statistics; computer security; decision analysis
Downloads: 152
[texts]Mobile agent security (Volume NIST special publication ; 800-19; Computer security) - Jansen, Wayne; Karygiannis, Tom
Mobile agent technology offers a new computing paradigm in which a program, in the form of a software agent, can suspend its execution on a host computer, transfer itself to another agent-enabled host on the network, and resume execution on the new host. The use of mobile code has a long history dating back to the use of remote job entry systems in the 1960's. Today's agent incarnations can be characterized in a number of ways ranging from simple distributed objects to highly organized software ...
Keywords: Mobile agents (Computer software); Software protection; Computer security
Downloads: 117
[texts]Ensuring a C2 level of trust and interoperability in a networked Windows NT environment - Lucas, Julie A.
Thesis advisor(s): Gus K. Lott, Cynthia E. Irvine, Rex Buddenberg
Keywords: Computer networks, Security measures; Computer security; Internetworking (Telecommunication)
Downloads: 115
[texts]Improvements to Wall Corrections at the NASA Langley 14 x 22-Ft Subsonic Tunnel - Iyer, Venkit
The new wall pressure measurement system and the TWICS wall correction system for the 14x22-Ft subsonic tunnel are described. Results from a recent semispan test and a full-span test are presented. Comparison with existing classical methods of correction is shown. A modification of the TWICS code to treat the effect due to a deflected wake from a high-lift wing is also discussed. The current implementation of TWICS for the 14x22-Ft tunnel is shown to be an improvement over existing methods.
Keywords: COMPUTER PROGRAMS; COMPUTER SYSTEMS PERFORMANCE; COMPUTER SECURITY; ALGORITHMS; AEROSPACE INDUSTRY
Downloads: 113
[texts]An introduction to computer security : the NIST handbook (Volume NIST special publication; 800-12. Computer security) - Guttman, Barbara; Roback, Edward

Keywords: Computer security--United States; Computer networks--Security measures--United States
Downloads: 332
[texts]Statistical Tools for Linking Engine-Generated Malware to Its Engine - Milgo, Edna Chelangat
Master's Thesis (M.S. in Applied Computer Science)--Columbus State University, 2009.
Keywords: Malware (Computer software); Computer security; Computer viruses; Spyware (Computer software)
Downloads: 174
[movies]Flow Analysis & Network Hunting Part 8: Analytics - Situational Awareness 2 - Mike McFail & Ben Actis
Get the class materials to follow along at http://OpenSecurityTraining.info/Flow.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Mike McFail & Ben Actis focuses on network analysis and hunting of malicious activity from a security operations center perspective. We will dive into the netflow strengths, operational limitations of netflow, recommended sensor placement, netflow tools, visualization of network data, analytic trade craft for network situational awareness and ne...
Keywords: OpenSecurityTraining.info; network security; netflow; flow analysis; netflow analysis; network hunting; intrusion detection; IDS; YAF; Silk; iSilk; Bro; Argus; network analysis; network sensoring; sensoring; Computers; Computer Security; Computer Security Class; Computer Security Training; Cyber Security; Technology; Training; Education
Downloads: 531
[movies]Flow Analysis & Network Hunting Part 2: YAF - Mike McFail & Ben Actis
Get the class materials to follow along at http://OpenSecurityTraining.info/Flow.htmlFollow us on Twitter for class news @OpenSecTraining.This course by Mike McFail & Ben Actis focuses on network analysis and hunting of malicious activity from a security operations center perspective. We will dive into the netflow strengths, operational limitations of netflow, recommended sensor placement, netflow tools, visualization of network data, analytic trade craft for network situational awareness and ne...
Keywords: OpenSecurityTraining.info; network security; netflow; flow analysis; netflow analysis; network hunting; intrusion detection; IDS; YAF; Silk; iSilk; Bro; Argus; network analysis; network sensoring; sensoring; Computers; Computer Security; Computer Security Class; Computer Security Training; Cyber Security; Technology; Training; Education
Downloads: 765
[1] 2 3 4 5 6 7 8     Next    Last
Advanced search

Group results by:

> Relevance
Mediatype
Collection

Terms of Use (10 Mar 2001)